Posts

Searching Blob Documents with the Azure Search Service

 One of the core services in the Microsoft Azure cloud platform is the Storage Service, which includes Blobs, Queues, and Table storage. Blobs are great for anything you would use a file system for, such as avatars, data files, XML/JSON files, ...and documents . But until recently, documents in blob storage had one big shortcoming: they weren't searchable. That is no longer the case. In this post, we'll examine how to search documents in blob storage using the Azure Search Service. Azure Blob Basics Let's quickly cover the basic of Azure blobs: Storage Accounts . To work with storage, you need to allocate a storage account in the Azure Management Portal. A storage account can be used for any or all of the following: blob storage, queue storage, table storage. We're focusing on blob storage in this article. To access a storage account you need its name and a key. Containers . In your storage account, you can create one or more named containers . A container is kind of l

Java Web Transaction Monitoring

  Applications Manager's Java web transaction monitoring agent provides you with unmatched visibility into the way your business … With our  Java monitoring  system, measure user satisfaction with  Apdex scores,  transaction traces and performance metrics of Java/ J2EE components, EJB, and SQL statements executed by the URL can be traced. Further, to identify bottlenecks in performance, a trail of the Java method invocations can be seen to identify the offending code. Gauge the performance of your database Get detailed performance metrics to identify the slow database calls, database usage and overall performance of the database furnished with detailed graphical and tabular representations. know more  java training Identify slow traces Get the execution details  (trace)  for URLs displayed as a tree structure. The trace will chart the sequence of the internal invocations  (methods)  of the URL.  Distributed traces If your application is running in a microservices environment, you c

List of 10 Best Business Analysis Tools

  A business analyst is one who deals with the requirements gathering, elicitation, analysis, and modelling on a day-to-day basis. As today everything is integrated with technology, no doubt a simple and efficient business analysis tool helps in performing the business analysis tasks more quickly and efficiently. You will find plenty of best business analysis tools list on the internet. know more B usiness analyst Training It is not possible for a business analyst to learn or use all such tools within the span of his work life. Hence, in this blog, we have focused on only the best business analysis tools which are used by almost all organizations. However, before using the tools, a business analyst must know the  best business analysis techniques  to implement these top business analysis tools correctly. Why do the business analysts need the best business analysis tools for analysis? Fundamentally, a business analyst needs the best business analysis tools to perform the following funct

AN EFFECTIVE WAY TO BRING SAP SECURITY NOTES UNDER CONTROL

  SAP has regularly published current security updates to the SAP Support Portal and SAP Solution Manager once a month on what as known as patch day. This provides IT departments with information on relevant security vulnerabilities. They can then import this information into their SAP system environments in good time to prevent the vulnerabilities from being exploited by attackers. However, there are often technical or organizational reasons as to why it is not possible to import the information promptly. This is because importing all relevant Security Notes into all   SAP systems would require a lot of effort. In addition, many companies defer patch implementation until the next system maintenance window in order to avoid unnecessary downtime. However, by this time, the   affected   SAP applications face even higher risks than before – when security updates are published, a large group of people learn about the existing security vulnerabilities and could exploit them specifically. Fo

IT Blog

  BABOK 2.0 Knowledge Area (KA) 4 covers Requirements Management and Communication which “ describes the activities and considerations for managing and expressing Requirements to a broad and diverse audience ” (The other KAs: Plan Requirements, Management Process, and Requirement Analysis will not be included here). The tasks from this KA “ are performed to identify business  needs (the why of the project; whereas requirements are the how) , the state the scope of their business solutions, ensure that all stakeholders have a shared understanding of the nature of these solutions and that those stakeholders with approval authority are in agreement as to the requirements that the business solution shall meets. ” It manages a baseline, tracks different versions of Requirements documents, and trace requirements from origin to implementation. know more Business analyst online training 1.  Manage Solution Scope and Requirements In this step, we “ obtain and maintain consensus among stakehold